Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity

被引:0
|
作者
Chen, Shaobo [1 ]
Li, Jiguo [2 ,3 ]
Zhang, Yichen [1 ]
Han, Jinguang [4 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350117, Peoples R China
[3] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[4] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based encryption (ABE); data integrity; decisional linear assumption; full security; PROXY RE-ENCRYPTION; SCHEME;
D O I
10.1109/JIOT.2023.3325996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cloud computing and cloud storage services that can reduce the local workload are becoming increasingly popular, allowing individual and corporate users to upload data to the cloud. Since the user's permissions in the system are not immutable, the users should have dynamic access. Revocation of users who have been granted access to data is also a strong need for cloud computing systems. In addition, we should ensure the data integrity after the cloud server performs a revocation. To address the above issues, we propose a revocable attribute-based encryption scheme that protects the data integrity (RABE-DI). Our scheme is more efficient compared with existing RABE-DI schemes. In addition, we prove the semantic security and integrity of the scheme. Experimental result shows that the similar scheme is not as efficient as ours.
引用
收藏
页码:10441 / 10451
页数:11
相关论文
共 50 条
  • [1] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [2] Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free
    Huang, Meijuan
    Liu, Yutian
    Yang, Bo
    Zhao, Yanqi
    Zhang, Mingrui
    [J]. INFORMATION, 2024, 15 (01)
  • [3] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [4] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    [J]. Wireless Personal Communications, 2019, 106 : 719 - 738
  • [5] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Yu, Ping
    Wen, Qiaoyan
    Ni, Wei
    Li, Wenmin
    Sun, Caijun
    Zhang, Hua
    Jin, Zhengping
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 719 - 738
  • [6] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [7] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [8] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    [J]. COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [9] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    [J]. INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [10] Fully secure revocable attribute-based encryption
    Qian J.-L.
    Dong X.-L.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (4) : 490 - 496